% -*-latex-*-
% Document name: /u/sy/beebe/tex/bib/epstein.ltx
% Creator: Nelson H. F. Beebe [beebe@plot79.math.utah.edu]
% Creation Date: Tue Nov 17 18:44:31 1992
%%% ====================================================================
%%% @LaTeX-file{
%%% author = "Jeremy Epstein",
%%% version = "1.05",
%%% date = "26 October 2010",
%%% time = "14:54:51 MDT",
%%% filename = "epstein.ltx",
%%% address = "TRW Systems Division
%%% 1 Federal Systems Park Drive
%%% Fairfax, VA 22033
%%% USA",
%%% telephone = "+1 703 803 4947",
%%% checksum = "17757 104 481 4019",
%%% email = "epstein@trwacs.fp.trw.com (Internet)",
%%% codetable = "ISO/ASCII",
%%% keywords = "bibliography, X Window System, security",
%%% license = "public domain",
%%% supported = "no",
%%% docstring = "LaTeX wrapper file to print the Epstein
%%% bibliography of Windowing Systems and
%%% Security.
%%%
%%% The checksum field above contains a CRC-16
%%% checksum as the first value, followed by the
%%% equivalent of the standard UNIX wc (word
%%% count) utility output of lines, words, and
%%% characters. This is produced by Robert
%%% Solovay's checksum utility.",
%%% }
%%% ====================================================================
\documentstyle[bibmods,bibnames,path,showtags,twocolumn]{article}
\pagestyle{headings}
\title{A Bibliography of Windowing Systems and Security}
\author{
Jeremy Epstein\\
TRW Systems Division\\
1 Federal Systems Park Drive\\
Fairfax, VA 22033\\
USA\\[\medskipamount]
Tel: +1 703 803 4947\\
E-mail: \path|epstein@trwacs.fp.trw.com| (Internet)
\thanks{%
This paper was originally published in {\em The X Resource},
{\bf 4}(1), 103--108, 1992.
}
}
\date{26 October 2010 \\
Version 1.05}
\begin{document}
\onecolumn
\maketitle
Over the past several years there has been an increasing interest in
windowing systems and security. Most of this interest has been in
security aspects of the X Window System\footnote{X Window System
is a trademark of the Massachusetts Institute of Technology.}, while
there has been some work in policy issues for windowing and in
windowing systems other than X.
Because X is a network protocol,
it is susceptible to many types of attack foreign to other windowing
systems. Additionally, X was designed without concern for security:
the X designers frequently state that X provides (graphical) ``mechanism
without policy'', but in the area of security, X provides ``policy
without mechanism.''
Much of the interest in security has come from
the government community, in particularly in the form of Compartmented
Mode Workstations (CMWs). The commercial world is increasingly sensitive to
issues of authentication in X, and to a lesser extent issues of audit
and access control to X resources.
This bibliography lists articles and publications addressing both
government and commercial security concerns.
The author welcomes additions and corrections
to this list at any of the addresses listed above.\footnote{Copyright
1992 by Jeremy Epstein. Permission is granted to make unlimited
copies of this document for any purpose and without fee, provided that
the above copyright notice and this permission notice is retained on
all copies.}
\nocite{*}
\bibliographystyle{unsrt} %% to get citations in .bib file order
%% to match the published paper
\section*{Title word cross-reference}
\begin{raggedright}
\parskip = \baselineskip
\input{\jobname.twx}
\end{raggedright}
\twocolumn
\bibliography{epstein}
\end{document}